Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 23:03

General

  • Target

    254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe

  • Size

    5.0MB

  • MD5

    b1339ad6250fec1d3a23a937e5bac9e8

  • SHA1

    9168638e8819de7a7415412f2bac059db500ca4b

  • SHA256

    254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76

  • SHA512

    5c2b630985e7f79bee3a5851b2344ea109457dce4b6d1e792f4d293889d4b8fe44107231a06972a8335ef928398533d1c3288b87f6619a961d71e8d2748c8d01

  • SSDEEP

    49152:10PYJq3qZ4XZr2Uuac+kp5Zu0i93Dg2rXlBAz55QENm3rUEexR3OFwqGu+AUUWUv:1XJq3qZYnAl+2m3rFeR+6R0HG

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://185.172.128.63

Attributes
  • install_dir

    6187fcb526

  • install_file

    Dctooux.exe

  • strings_key

    cd3b2619c9009c441355ae581d53163e

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe
    "C:\Users\Admin\AppData\Local\Temp\254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

      Filesize

      491KB

      MD5

      f011e7003806589659c8bd9228363552

      SHA1

      774a930af1de32eeb96d104114ec82d0232f48fd

      SHA256

      9684325f586cd9312d9c8cf21b148b43e00629041c834c79a528b34dbc8c7341

      SHA512

      6e69d0186fa3182f4fcb9b92e5e4281579e841705472b6991e0e31f64f445bb08843888e0bea26eb7ac8831fedddbe6737182e1b6ac3cf672f556a3db62555ee

    • memory/964-25-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/964-24-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/964-21-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/964-23-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1956-5-0x0000000007070000-0x00000000072F8000-memory.dmp

      Filesize

      2.5MB

    • memory/1956-3-0x0000000074980000-0x0000000075130000-memory.dmp

      Filesize

      7.7MB

    • memory/1956-0-0x0000000074980000-0x0000000075130000-memory.dmp

      Filesize

      7.7MB

    • memory/1956-12-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-16-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-18-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-20-0x0000000006370000-0x0000000006470000-memory.dmp

      Filesize

      1024KB

    • memory/1956-22-0x0000000006370000-0x0000000006470000-memory.dmp

      Filesize

      1024KB

    • memory/1956-4-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-6-0x0000000005F40000-0x00000000060D2000-memory.dmp

      Filesize

      1.6MB

    • memory/1956-2-0x0000000005BA0000-0x0000000005C3C000-memory.dmp

      Filesize

      624KB

    • memory/1956-1-0x0000000000C40000-0x000000000113A000-memory.dmp

      Filesize

      5.0MB

    • memory/1956-19-0x0000000006370000-0x0000000006470000-memory.dmp

      Filesize

      1024KB

    • memory/1956-17-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-15-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-14-0x0000000005B90000-0x0000000005BA0000-memory.dmp

      Filesize

      64KB

    • memory/1956-13-0x0000000003470000-0x0000000003480000-memory.dmp

      Filesize

      64KB

    • memory/1956-31-0x0000000074980000-0x0000000075130000-memory.dmp

      Filesize

      7.7MB